madfedora

[ My Collection Of Books on Security ]

Jul 15th, 2013
149
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.25 KB | None | 0 0
  1. Hunting Security Bugs | Tom Gallagher; Bryan Jeffries; Lawrence Landauer | Microsoft Press
  2. Coding for Penetration Testers | Jason Andress; Ryan Linn | Syngress
  3. Moving to the cloud developing apps in the new world of cloud computing | Sitaram, Dinkar | Syngress
  4. Hardware hacking : have fun while voiding your warranty | Syngress
  5. Security risk management building an information security risk management program from the ground up | Wheeler, Evan | Syngress
  6. OS X exploits and defense | Syngress
  7. Digital forensics with open source tools | Altheide, Cory | Syngress
  8. Digital forensics for legal professionals understanding digital evidence from the warrant to the courtroom | Daniel, Larry | Syngress
  9. Dissecting the hack : the forb1dd3n network | Syngress
  10. Securing the cloud cloud computer security techniques and tactics | Winkler, J. R. | Syngress
  11. Securing SQL server protecting your database from attackers | Cherry, Denny | Syngress
  12. Developer's guide to web application security | Cross, Michael | Syngress
  13. Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems | Knapp, Eric | Syngress
  14. The basics of hacking and penetration testing : ethical hacking and penetration testing made easy | Engebretson, Pat | Syngress
  15. Nmap in the enterprise : your guide to network scanning | Orebaugh, Angela | Syngress
  16. Seven deadliest USB attacks | Anderson, Brian | Syngress
  17. Android forensics investigation, analysis, and mobile security for Google Android | Hoog, Andrew | Syngress
  18. Unauthorised access : physical penetration testing for IT security teams | Allsopp, Wil
  19. Hack proofing your Web applications | Syngress
  20. # Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions | Davis, Michael A
  21. Malware forensics : investigating and analyzing malicious code | Aquilina, James M | Syngress
  22. SQL server forensic analysis | Fowler, Kevvie
  23. Windows forensic analysis toolkit | Carvey, Harlan A
  24. Xbox 360 forensics a digital forensics guide to examining artifacts | Bolt, Steven
  25. The basics of digital forensics the primer for getting started in digital forensics | Sammons, John | Syngress
  26. 19 deadly sins of software security : programming flaws and how to fix them | Howard, Michael
  27. Hacking : the next generation | Dhanjani, Nitesh
  28. The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice | Winterfeld, Steve | Syngress
  29. # Stealing the Network | Johnny Long
  30. Penetration tester's open source toolkit | Faircloth, Jeremy
  31. Metasploit toolkit for penetration testing, exploit development, and vulnerability research | Maynor, David
  32. Netcat power tools
  33. Cyber warfare techniques, tactics and tools for security practitioners | Andress, Jason
  34. Practical lock picking : a physical penetration tester's training guide | Ollam, Deviant
  35. Reverse engineering code with IDA Pro
  36. # Network forensics : tracking hackers through cyberspace | Davidoff, Sherri
  37. Darkmarket : cyberthieves, cybercops and you | Glenny, Misha
  38. Malware, rootkits & botnets : a beginner's guide | Elisan, Christopher C
  39. Traces of guilt : hunting our most dangerous computer criminals | Barrett, Neil
  40. Inside Wikileaks : my time with Julian Assange at the world's most dangerous website | Domscheit-Berg, Daniel
Advertisement
Add Comment
Please, Sign In to add comment